You are on page 1of 9

International Journal of Trend in Scientific

Research and Development (IJTSRD)


International Open Access Journal
ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume - 1 | Issue – 6

An Energy-aware
aware Distributed Clustering Protocol in
Wireless Sensor Networks
Venkateswarulu Naik. B Dr.S.Rama Krishna
JJTU Scholar, Jhunjhunu, Rajasthan, India Principal, SVIT, Secunderabad, India

ABSTRACT
Clustering is an effective approach for organizing a ease of deployment, long system lifetime, and low-low
network into a connected hierarchy, load balancing, latency data transfers. The main task of a sensor node
and prolonging the network lifetime. This paper in a sensor field is to detect events, perform quick
proposes an energy-aware aware distributed dynamic local data processing,
essing, and then to transmit the data
clustering protocol (ECPF) which applies three [2]. As mentioned in [3] and [4], nodes have typically
techniques: low mobility and are limited in capabilities, energy
1) Non-probabilistic
probabilistic Cluster Head (CH) elections. supply and bandwidth. The sensor network should
2) Onn demand clustering. The remaining energy of the perform for as long as possible. On the other hand,
nodes is the primary parameter for electing tentative battery recharging
charging may be inconvenient or impossible.
CHs via a non-probabilistic fashion. Anon- Therefore, all aspects of the sensor node, from the
probabilistic Selection is implemented by introducing hardware to the protocols, must be designed to be
a delay inversely proportional to the residual energy extremely energy efficient [5]. In a sensor node,
of each node. Therefore, tentative CHs are selected energy consumption can be “useful” or “wasteful”.
based on their remaining energy. Besides, in ECPF, Useful energy
ergy consumption can be due to one or more
CH elections are performed sporadically (in contrast of the following causes: x transmitting/receiving data
to performing it every round). Simulation resul results x processing query requests x forwarding queries/data
demonstrate that our approach performs better than to neighboring nodes Wasteful energy consumption
well known protocols (LEACH, HEED, and CHEF) can be due to:
in terms of extending network lifetime and saving
energy.  Idle
dle listening to the media x retransmitting
retransmi due to
packet collisions x overhearing
Keywords: Sensor Networks, Clustering, Network  Generating/handling
enerating/handling control packets [6]
Lifetime, Energy Efficient Protocols, Distributed
Algorithms In direct communication WSN, the sensor nodes
directly transmit their sensing data to the Base Station
1. INTRODUCTION (BS) without any coordination between the two.
However, in Cluster-based
based WSNs, the network is
Wireless sensor networks (WSNs) provide reliable divided into clusters. Each sensor node exchanges its
monitoring from very long distances. These networks information only with its cluster head (CH), which
are basically data gathering networks in which data transmits the aggregated information to the BS.
are highly correlated and the end user needs a high Aggregation and fusion of sensor node data at the
level description of the environ mentis ensued by the CHs cause a significant reduction in the amount of
nodes [1]. The requirements of these networks are data sent to the BS and so results in saving both
energy and bandwidth resources. Once the clusters are

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 6 | Sep - Oct 2017 Page: 1130
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
constructed, each sensor node will be given an environment. Merging different environmental
exclusive time slot; therefore, each sensor node knows parameters according to predefined rules and then
when to transmit. Consequently, a node does not making a decision based on the result is another
require being awake during the complete Time important application of fuzzy logic. Typically, fuzzy
Division Multiple Access (TDMA) frame, but only clustering algorithms in WSNs use fuzzy logic for
during its specific time slot [7]. To sum up, by means merging different clustering parameters to elect CHs.
of a common schedule, clustering coordinates the Besides, as mentioned in [11] and [16] the overhead
transmissions of sensor nodes during the steady state of cluster head election may be highly reduced by
phase and so eliminates collisions, idle listening, and using fuzzy logic. This paper proposes an Energy-
overhearing. In this way, clustering achieves a aware distributed dynamic Clustering Protocol using
significant improvement in terms of energy Fuzzy logic named ECPF. The proposed clustering
consumption. Besides, it is particularly crucial for approach does not make any assumptions regarding
scaling the network to hundreds or thousands of nodes the distribution of the nodes or node capabilities, e.g.,
[8]. In many applications, cluster organization is a location-awareness. The protocol only assumes that
natural way to group spatially close sensor nodes in sensor nodes can vary their transmission power. In
order to exploit the correlation and Page | 4 eliminate this protocol, each node employs a process to decide
the redundancy that often shows up in the sensor its status. For each node, this process finishes when
readings [9]. However, these benefits, compared to the node either elects itself as a CH or finds a CH to
those of the direct communication WSN, result in join. Notable features of ECPF are: x Distributed CH
extra overhead due to the cluster formation’s message election (based on local information) that avoids extra
exchanges. Research on clustering in WSNs has communication with the BS.
focused on developing centralized and distributed
protocols to compute sets of CHs and to form clusters. Non-probabilistic choice of CH: a node waits for a
Centralized approaches (e.g. [10, 11, 12, and 13]) are certain delay (which is inversely proportional to the
rather inefficient in the case of large scale networks remaining energy of that node), before it tries to
since collecting the entire amount of necessary proclaim itself as a CH or join a cluster. The nodes
information at the central control (BS) is both time whose delays expire first among the neighboring
and energy consuming. Distributed approaches are nodes will become a tentative CH, and in the next
more efficient for large scale networks. In these round a cost-based choice is made to choose a final
approaches, a node decides to become a CH or to join CH from the set of neighboring tentative ones
a cluster based on the information obtained solely Clustering is performed sporadically (on demand
from neighbors within its proximity. Several rather than each round) when some CH depletes a
distributed clustering protocols have been proposed in given fraction of its energy resources. We compare
literature (e.g. [5, 6, 14, 15, and 16]). As mentioned in our solution to LEACH, HEED, and CHEF protocols.
[17], most of these protocols are in either case of Simulation results in Mat lab software show that
iterative or probabilistic. In probabilistic protocols ECPF provides superior network lifetime and energy
(e.g. [14, 15, and 18]), the decision to become CH is savings. The rest of the paper is organized as follows:
reached probabilistically. On the other hand, in Section 2 gives a short survey of cluster based
iterative protocols (e.g. [6]), the nodes perform an protocols for WSNs. Section 3 describes the network
iterative process to decide when there to become a CH model and clustering problem. A new energy efficient
or not. From another point of view, clustering clustering scheme is outlined in Section 4. Section 5
protocols are considered as being static and dynamic. presents the simulation results by comparing energy
In static clustering, the clusters are permanently consumption, network lifetime, and the number of CH
formed (e.g. [8, 10]), while in dynamic clustering elections with other well-known algorithms. Finally,
(like [5, 6, 9, 14, and 15]), protocol operation is the conclusion is presented.
divided into rounds; clusters are formed for a round
and then should be formed again for the next round. 2. RELATED WORKS
In doing so, extra overhead is imposed on the system.
On the other hand, some protocols (e.g. [11, 16, 12, The following presents a review of some famous
and 13]) take advantage of fuzzy logic. Fuzzy Logic clustering protocols. LEACH [5] minimizes energy
[19, 20] is useful for making real-time decisions dissipation in sensor networks due to its constructing
without needing complete information about the of clusters. LEACH operation is performed in two

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 6 | Sep - Oct 2017 Page: 1131
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
phases: a setup phase and a steady state phase. In the node’s residual energy. Through applying this
setup phase, a sensor node selects a random number threshold each node decides whether to become a CH
between 0 and 1. If this number is less than the in a round or not lifetime can be efficiently increased.
threshold T(n), the node becomes a CH. T(n) is There are 27 fuzzy if-then rules which are defined at
computed as: the BS. The BS elects the CHs according to these
fuzzy rules. This centralized approach is not suitable
Where r is the current round; p, the desired percentage for scalable networks because BS must collect
for becoming CH; and G is the collection of nodes not information about the status and location of all nodes.
elected as a CH in the last 1/p rounds. After being LEACH-FL [2] is an improvement on LEACH
elected, every CH announces to all of the network’s protocol which employs a similar approach to [3].
sensor nodes that it is the new CH. When each node This method uses three descriptors (node residual
receives this announcement, it chooses a cluster to energy, node degree and distance from BS) for
join based on the signal strength of the announcement. computing the chance. The BS selects nodes with
The sensor nodes then inform their appropriate CH to higher chance as CHs, using 27 fuzzy if-then rules.
join them. Afterwards, the CHs, according to a Although this method has the same drawback of
TDMA approach, assign a time slot to each node so Gupta’s method, it presents a better result than
that its data can be sent to its CH during this period. LEACH protocol. CHEF [4 is a fuzzy approach which
During the steady state phase, the sensor nodes can performs CH election in a distributed manner. In
perform sensing and transmit data to the CHs. The every round, each node generate s a random number
CHs also aggregate the data received from the nodes between 0 and 1. If the random number is smaller
in their cluster before sending these data on to the BS. than the predefined threshold, then that node becomes
After a certain period of time has elapsed in the steady a tentative CH. There are two fuzzy descriptors that
state phase, the network goes into the setup phase are used in CH election: residual energy of each node
again and enters the next round. The advantages of the and local distance. The local distance is the sum of
LEACH protocol over previous research are as distances that a node has with other nodes in radius r.
follows: In this probabilistic approach, the nodes die There are 9 fuzzy if -then rules that are defined in all
randomly and at the same rate’s The dynamic sensor nodes. Tentative CHs calculate their chances to
clustering of LEACH prolongs the network lifetime. x be an actual CH using these fuzzy rules. If the chance
LEACH is fully distributed and does not require of a tentative CH is greater than the other tentative
global knowledge of the network. The limitations of CHs’ chances in radius r, then that tentative CH
the LEACH protocol are as follows: x although becomes an actual CH. Then, it sends a CH
energy consumption is a critical problem in WSNs, advertisement message to the nodes in its proximity.
LEACH does not consider the remaining energy of The nodes that are not elected as CH join the closes t
nodes when selecting CHs. x Since CH election is CH. This method applies a probabilistic model for CH
probabilistic, a node with very low energy has a good elections, too. Therefore, it is possible that CHs are
chance of becoming a CH. When this node dies, the not well distributed in the field. Consequently, some
entire cluster is rendered dysfunctional. x It is nodes find themselves uncovered (orphan nodes), and
possible that some CHs are located within close have to send their sensed data directly to the BS.
proximity of each other. This indicates that CHs are
not well distributed in the network. x It is assumed Bandyopadhyay and Coyle [15] proposed another
that CHs have a long communication range enabling extension of the LEACH protocol where the multi-
them to send data directly to the BS. This assumption hop routing is applied. Similar to LEACH, every CH
is not always realistic since, due to signal propagation advertises itself to the neighboring sensor nodes,
problems, such as the presence of obstacles, the BS is which relay the advertisement in a multi-hop fashion.
often directly unreachable to all nodes. On the other The advertisement is forwarded to sensor nodes in at
hand, the CHs have the capabilities of regular sensor most h hops away. Cluster Members (CMs) that
nodes. Consequently, LEACH is not applicable to receive multiple CH announcements, elect the closest
networks deployed in large areas. CH in terms of hop count. On the other hand, a sensor
node which is neither a CH nor receives any CH
The authors in [14] extended the LEACH’s announcement becomes a forced CH. WSN operation
probabilistic CH selection algorithm. They adjusted in a multi-hop fashion has more energy conservation
the threshold T(n) denoted in (1), relative to the in communications in comparison with single hop

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 6 | Sep - Oct 2017 Page: 1132
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
transmissions, especially in large scale networks. This dissipation which results in decreasing the network
gain achieves in the cost of additional complexity, lifetime. Some protocols attempt to eliminate
e.g., the one hop CMs require data collection from the overhead due to setup phase. As an example in [8],
two hop CMs. In addition, the overhead in the setup Zhu et al presented a distributed static clustering
phase increases considerably, because CH messages protocol to prolong the network lifetime. This
have to be forwarded via multiple hops. Youngish and includes three parts. First, nodes by means of
Filmy [6] proposed an iterative clustering protocol, Hausdorff clustering algorithm organize themselves
named HEED. HEED is different from LEACH in the into multiple static clusters based on location of
manner in which CHs are elected; however, it nodes, communication effectiveness, and network
employs probabilistic fashion. Both electing CHs and connectivity. Second, clusters are formed only once,
joining clusters are performed based on the hybrid and the CH role is scheduled between the CMs
combination of two parameters. The primary optimally. Third, after CH elections, CHs construct a
parameter depends on the node’s residual energy. The backbone network to periodically collect, aggregate,
alternative parameter is the intra-cluster and send data to the BS using minimum energy
communication cost. This technique is utilized in routing. They showed that this method considerably
ECPF with a fuzzy cost. In HEED, each node prolong the network lifetime in comparison with some
computes a communication cost depending on other known methods because it eliminates the
whether variable power levels, applied for intra- communication overhead due to setup phase. This
cluster communication, are permissible or not. If the approach suffers the problems due to the proximity of
power level is fixed for all of the nodes, then the the CHs.
communication cost can be proportional to (i) node
degree, if load distribution between CHs is required, 3. PRELIMINARIES
or (ii) 1/node degree, if producing dense clusters is
required. The authors defined AMRP the average of 3.1 Network Model
the minimum power levels needed by all M nodes
The following properties are assumed in regard to the
within the cluster range to access the CH u, i.e.
sensor network being studied:
MiMinPwruAMRPMi1)()(. If variable power levels
are admissible, AMRP is used as the cost function. In  The nodes can use power control to change the
this approach, every regular node elects the least amount of transmit power. Also, each node
communication cost CH in order to join it. On the performs signal processing functions and has the
other hand, the CHs send the aggregated data to the computational power to support different MAC
BS in a multi-hop fashion. The advantages of the protocols.
HEED protocol are as follows:  The nodes have ideal sensing capabilities. In other
 It is a fully distributed clustering approach that words, the quality of the node’s sensing does not
benefits from the use of two parameters for CH change within the cluster range regardless of the
election. distance from the node.
 The probability of two nodes within each other’s  The sensor nodes are quasi-stationary. This is
transmission range becoming CHs is negligible. typical for sensor network applications. x Nodes
Therefore, in contrast with LEACH, CHs are well are not equipped with GPS-capable antennae,
distributed in the network. meaning they are location-unaware In addition to
 Energy consumption is not required to be uniform being of equal importance, the capabilities of
for all the nodes. nodes, such as processing and communicating, are
 Communications in a multi-hop fashion between similar.
CHs and the BS promote more energy  Nodes are energy constrained and are left
conservation and scalability in contrast with the unattended after deployment. Therefore, battery
single-hop fashion in the LEACH protocol. recharge is not possible.
 Because the energy consumed per bit for sensing,
The limitations of the HEED protocol are as follows: processing, and communicating is typically
It uses a probabilistic model for CH elections. known, remaining energy can be estimated. As a
Similar to LEACH, the performing of clustering in result, measuring this remaining energy is not
each round imposes significant overhead on the essential.
network. This overhead causes noticeable energy

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 6 | Sep - Oct 2017 Page: 1133
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
 Each node has an initial amount of energy, Amax, are distributed in a field. In consideration of energy
and the BS is not limited in terms of energy, saving issues, the goal is to identify a collection of
memory, and computational power. CHs which cover the entire area. Each node vi, where
 Node failures are basically due to energy 1 ≤ i ≤ n, must be mapped to exactly one cluster cj,
depletion. where 1 ≤ j ≤ nc, and nc is the number of clusters (nc
 Distance can be measured based on the wireless ≤ n). Li shall denote the lifetime of node i. The
radio signal power. network lifetime will be defined as follows: x F is the
 Links are symmetric, i.e., two nodes v1 and v2 time elapsed until the First Node Dies (FND).
can communicate using the same transmission Therefore, F = min (L1, L2, …, Ln). x H is the time
power. TCP and TNO are defined as follows: elapsed until only one Half of Nodes remain Alive
 TCP (the period of the clustering process) is the (HNA). In other words, H = median (L1, L2, …, Ln).
time interval used by the clustering protocol to x L is the time elapsed until the Last Node Dies
cluster the network. (LND) or, L = max (L1, L2, …, Ln). The major
 TNO (the network operation interval) is the time purpose here is to maximize F, H, and L, which
between the end of a TCP interval and the start of requires using the energy of all nodes uniformly. A
the subsequent TCP interval. In order to reduce node must have the ability to directly communicate
overhead, it must be ensured that T NO TCP. with its CH and by a single-hop fashion. A CH has
two critical responsibilities: (1) intra-cluster
Note that, in contrast with other dynamic clustering coordination and (2) inter-cluster communication.
protocols that perform clustering in each round, ECPF Multi-hop routing is used for inter-cluster
clusters the nodes on demand rather than at each communication. CHs can utilize a routing protocol to
round. Therefore, it is possible that some rounds do compute inter-cluster paths for communicating in a
not include TCP; instead TNO is extended during multi-hop fashion with the BS, e.g. the power-aware
these rounds. As a result, the length of the TCP routing protocol in [22].
interval is fixed but the length of the TNO interval The following requirements are recommended:
varies throughout the network lifetime. In ECPF, node  Clustering is fully distributed. Each node decides
readings are periodically reported to the BS. independently based on local information’s
Therefore, a TDMA frame is created in each CH to Clustering finishes within a fixed number of
remove interference within a cluster. The protocol iterations (regardless of network diameter).
uses special synchronization pulses to alert the sensor  At the end of each TCP, each node is either a CH
nodes that clustering will be triggered in the or a regular node that belongs to exactly one
beginning of the next round. These pulses are cluster.
propagated in a centralized multi-hop fashion (like the  In terms of processing complexity and message
approach presented in [21]). The basis of this exchange, clustering should be efficiently
approach is the construction of a low-depth spanning performed.
tree T comprising the nodes in the network. In  CHs are well distributed over the sensor field.
general, a new spanning tree is constructed each time Note that, in the clustering process, every iteration
the algorithm is performed. In order to synchronize takes time, tc. Period tc should be long enough to
nodes in the tree, pair-wise synchronizations are receive messages from any neighbor within the
performed along the edges of T. In centralized multi- cluster radius. Because the nodes are quasi-
hop synchronization, the reference node (BS) initiates stationary, neighbor discovery is not required
the synchronization through all its immediate (single- every time clustering is performed. Therefore, the
hop) children in T. Next, every child of the reference neighbor set of every node does not vary very
node, in turn, synchronizes with its children. This frequently. In multi-hop networks, the nodes
process continues until the leaf nodes of T are automatically update their neighbor sets by
reached. The algorithm terminates when all the leaf periodically sending and receiving heartbeat
nodes are synchronized. The running time of the messages.
algorithm is proportional to the depth of the tree
which is log(n), where n is the number of nodes in the 3. THE PROTOCOL
tree. Therefore, these pulses are quickly penetrated In this section, the ECPF and its pseudo code are
throughout the network. 3.2 The Clustering Problem illustrated. The operation of ECPF is divided into
Suppose the above assumptions hold and that n nodes rounds and each round is comprised of two phases:

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 6 | Sep - Oct 2017 Page: 1134
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
1. The setup phase, which includes CH election and input-output relationship is expressed by using a set of
consequently cluster formation. In addition, in this linguistic rules or relational expressions. As shown in
phase, every CH coordinates with its members to Fig. 2 a FL basically con sits of four important parts
send sensing data during the following phase. including a fusilier, a defuzzifier, an inference engine,
2. The steady state phase, which is broken up into and a rule base. As in many fuzzy applications, the
TDMA frames. During each frame, every regular input data are usually crisp, so a fuzzification is
node, at the time of its respective time slot, sends necessary to convert the crisp input data into a
sensing data to its CH (similar to [5]). At the end suitable set of linguistic value which is needed by the
of each TDMA frame, every CH forwards the inference engine. In the rule base of an FL, a set of
aggregated data to the BS through the CHs. fuzzy rules, which characterize the dynamic behavior
of the system, are defined. The inference engine is
This protocol has the following characteristics which used to form inferences and draw conclusions from
resemble [6]’s: the fuzzy rules. The output of the inference engine is
sent to the defuzzification unit. Defuzzification is a
 The steady state phase is similar.
mapping from a space of fuzzy actions into a space of
 A chosen CH advertises only to its neighbors.
crisp actions. We have employed the most commonly
 Each node can directly communicate with its CH.
used fuzzy inference technique, called the Madman
 During the clustering process, a node can be either
[23] method, because of its simplicity. To obtain a
a tentative_CH or a final_CH or it can be covered
cost, ECPF uses two fuzzy sets and the fuzzy if-then
At the end of the setup phase, CHs form a network
rules. We adjusted the input variables, used in the
backbone, such that packets are routed from the
fuzzy if-then rules, between 0 and 1 such that the
CHs to the BS in a multi-hop fashion over CHs.
fuzzy sets will be applicable for any size of networks.
4.1 On Demand Clustering The fuzzy system input variables are defined as
follows:
A novelty of ECPF is that it decreases overhead by
performing the setup phase on demand instead of in  Node degree: the number of neighbors a node has
each round, To do so, when the clustering process which is divided by total number of nodes in the
finishes (at the end of each setup phase), every CH network. In other words, node_degreei =
saves its residual energy in its memory, for example (|Snarl(i)| / #nodes) where, Snarl(i) = {v: v lies
in its ECH variable. During the steady state phase, within node if’s cluster range}.
whenever a CH finds that its Residual falls below  Node centrality: a value that shows how central
echo (α is a constant number and 10, it sets a the node is among its neighbors proportional to
prespecified bit in a data packet which is ready to be network dimension, or
sent to the BS in the current TDMA frame. Upon node_centralityi=Dimension
receiving the forwarded CH data packet (sent in a NetworkiSjidistnbriSjnbr_)(/)),(()(2¦.
multi-hop fashion), the BS informs the sensors to hold Since, typically transmissions energy is proportional
the setup phase at the beginning of the upcoming to the squared distance, the lower value of the node
round. This could be achieved by having the BS send centrality results in a lower amount of energy required
out, in a multi-hop fashion, specific synchronization by other nodes to send data to the node assuming the
pulses to nodes. These pulses are quickly dispersed role of a Chute fuzzy sets of input variables and
throughout the network. When every node receives a output variable (cost) are described in Fig. 3. ECPF
pulse, it prepares itself to perform clustering. calculates a cost using fuzzy if-then rules. A smaller
Therefore, CH election and consequently cluster cost means that the node has a higher priority of being
formation are performed on demand. As a result, the elected a CH. Based on the two fuzzy variables, fuzzy
overhead created by consecutive setup phases is if-then rules can be defined which are similar to those
tremendously reduced. Consequently, there is a presented in Table I. After aggregating the results
decrease in the energy dissipation of nodes and an achieved from each rule, a efuzzification method is
increase in network lifetime. required to obtain the crisp value. Defuzzification is
4.2 Fuzzy Cost performed using the Coal method, which returns the
Center of Area under the fuzzy set achieved
Fuzzy Logic (FL) is used to model human experience aggregating conclusions. demonstrates the effect of
and human decision making behavior. In FL the nodes’ attributes on the chance of the nodes becoming

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 6 | Sep - Oct 2017 Page: 1135
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
CHs. This plot was generated by the rules that final_CH) node can send a Chums only once. It is
accounted for both node degree and node centrality possible that in the beginning of this phase some
factors. With the increase of node degree and decrease neighboring nodes whose delays expire at the same
of node centrality, the cost of a node to be selected as time will become tentative_CHs, however in the next
a CH is decreased. A node with lower cost has more iteration only one of them declares itself as a
priority for becoming CH. final_CH. Therefore, final_CHs do not locate in each
4.3 Clustering Process other’s cluster range. See the Main processing phase x
Finalization Phase: During this phase, each sensor
The clustering process of ECPF is divided into three node makes a final decision about its status. If the
phases: node is not a final_CH and has received at least one
final_CH message, it will elect the final_CH with the
Initialization Phase:
least cost to join it. If a node completes the clustering
In the beginning of this phase, neighbor information
process and has not yet received any final_CH
could be updated using CSMA/CA. Afterwards, each
message, it will find itself uncovered and so shall
node may compute its cost independently. The cost is
introduce itself as the final_CH. See the Finalization
the output of fuzzy system described in the previous
phase .All distributed protocols face the convergence
section. This cost will not be broadcasted to neighbors
issue in the cluster head election (e.g. when two nodes
as it is exchangeable through Chums messages. As
receive tentative CHs messages with same cost). This
previously mentioned, note that updating the neighbor
condition rarely happens; both of the nodes should
information and computing costs are not required
have equal amount of energy to have equal delay
every time clustering is triggered. Each sensor node
time, on the other hand, they should not be in the
sets its own delay time:
cluster range of any final_CH. Besides, they should
),(1_maxmaxdEEMAXtimedelayresidualmIn the
execute the algorithm at the same time. However, the
above, Residual is the current energy of the sensor
least cost function can select the node with the lower
node and Exam is the maximum energy
ID in this case.
corresponding to a fully charged battery. Therefore,
the main constraint in sensor nodes, i.e., residual
energy, is taken into account in this delay time. The 5. SIMULATION RESULTS
value of dams limits the period of time should be In this section, a comparison between the simulation
elapsed in the clustering process. See the Initialization results in ECPF, LEACH, HEED and CHEF protocols
phase in x Main processing Phase: In this phase, every is performed via Mat lab software. The following
node must wait until the expiration of its delay time. assumptions and system parameters (similar to [5])
If a node does not hear the Chums message from any are used:
other sensor node during the delay time, upon delay
time expiration it shall declare itself to be a tentative  The nodes always have data to send to the end
CH. The node announces its status by sending user and the nodes situated in close proximity to
Chums(Nodded, tentative_CH, cost), to all the nodes others have correlated data.
within the cluster range. Note that when a node has  The energy required for data aggregation is set as
higher energy, its delay time is less than that of nodes EDA=5nJ/bit/signal and CHs perform ideal data
with a lower amount of energy. As a result, because aggregation (i.e. all the messages received from
its delay time has expired sooner, the node has a cluster members can be aggregated into a single
higher priority of becoming selected as a message).
tentative_CH. In this way, the non-probabilistic  A simple model for the energy dissipation of radio
method of selecting CHs is employed. In the next hardware is assumed, in which the receiver
iteration, if this particular node has the least cost dissipates energy to run the radio electronics and
among the tentative_CHs in its proximity, it will the transmitter dissipates energy to run the power
become a final_CH and shall broadcast a final_CH amplifier and radio electronics, as shown in. Thus,
message within its cluster range. On the other hand, if for transmitting a k-bit message over distance d,
a node receives a final_CH message, it can no longer the radio expends: ETx(kid) = ETx_elec(k) +
be elected as a CH. Therefore, in the following phase, ETx_amp(kid)
it must choose to connect to one of the final_CHs in
its cluster radius, based on the cost of that final_CH.
Observe that, in this phase, each tentative_CH (or

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 6 | Sep - Oct 2017 Page: 1136
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
5.1. Setting α Variable diameter. Combining fuzzy logic, on demand
clustering, non-probabilistic CH election, and
As mentioned before, CH election (clustering consideration of nodes’ energy, allows ECPF achieve
execution) is performed on demand. When a CH longer lifetime when compared to existing clustering
consumes a prespecified part of its energy (i.e. protocols. Many applications require the ability to
CHresidualEEDd), it indirectly informs the other provide information from each part of the monitored
nodes that clustering must be performed for the area at any moment in order to meet the application’s
upcoming round. In order to obtain the proper α, quality of service (Quos) [9]. For future works, we
ECPF was run for the two scenarios described above. would like to extend the protocol to meet Quos
α differs from 0 to 1 and each plot demonstrates the requirements of WSNs, such as coverage
average of three executions for 100, 200, 300, and 400 preservation, because complete coverage of the
number of nodes, until the first node dies (FND). Also monitored area over long period of time is an
plotted is an average of the four mentioned plots. outstanding issue.
When α is equal to zero, no clustering is performed
during the network lifetime (i.e. the static clustering REFERENCES
approach that considers fixed CHs). In homogenous
networks in which nodes have similar capabilities and 1) W. B. Heinemann, “Application-specific protocol
the same amount of energy, CHs quickly deplete architectures for wireless networks,” Ph.D. Thesis,
respective energies. Therefore, when a CH dies, the Massachusetts Institute of Technology, (2000).
respective cluster becomes dysfunctional. When α 2) I. Akiyldiz, W. Su, Y. Sankarasubramaniam, and
equals one, this signifies that clustering is performed E. Cerci, “A survey on sensor networks,” IEEE
in each round, similar to the LEACH, HEED and Communication Magazine, vol. 40, no. 8, pp. 102-
CHEF protocols. Considering the plot, which is the 114, (2002).
average of the four different numbers of nodes,
figures 8-14 are plotted using 8.0 Das it 3) O. Youngish and S. Foamy, “Distributed
approximately results in better network lifetime. clustering in ad-hoc sensor networks: A hybrid,
energy-efficient approach,” in Proceeding of IEEE
5.2 Energy Consumption Comparisons INFOCOM, vol. 1, pp. 629-640, (2004).
4) K. Akaka, M. Youngish, “A survey on routing
In this subsection, the energy dissipation to cluster the protocols for wireless sensor networks,” Ad Hoc
WSN and the energy consumption to transmit the Networks, vol. 3, no. 3, pp. 325-349, (2005).
sensed data to the BS are evaluated. Note that in the
figures belonging to this subsection, the vertical axis 5) W. B. Heinemann, A. P. Chandrakasan, and H.
in Scenario 1 does not have an equal range of data in Balakrishnan, “An application-specific protocol
contrast to Scenario 2 because of the high energy architecture for wireless micro sensor networks,”
dissipation of LEACH in Scenario 2. In Fig. 8, the IEEE Transactions on Wireless Communications,
average energy dissipation of protocols clustering the vol. 1, no. 4, pp. 660-670, (2002).
WSN per election is evaluated. The ECPF performs 6) O. Youngish, S. Filmy, “HEED: A Hybrid,
better because its clustering’s message complexity is Energy-Efficient, Distributed clustering approach
low and, similar to HEED and CHEF. for Ad Hoc sensor Networks,” IEEE Transactions
on Mobile Computing, vol. 3, no. 4, pp. 366-379,
6. CONCLUSION (2004).
In this paper, we proposed an energy efficient, 7) N. Bouabdallah, M. E. Rivers–Angeles, and B.
distributed clustering protocol for WSNs. Our Seri cola, “Continuous Monitoring Using Event-
approach can be useful for applications that require Driven Reporting for Cluster-Based Wireless
scalability, prolonged network lifetime and nodes are Sensor Networks,” IEEE Transactions on
dispersed in a spacious field. We assumed quasi- Vehicular Technology., vol. 58, no. 7, pp. 3460-
stationary networks in which nodes are location- 3479, (2009).
unaware and have equal significance. Based on this
assumption, we presented the ECPF, where terminates 8) X. Zhu, L. Sheen, and T. P. Yum, “Hausdorff
CH election process with a constant number of Clustering and Minimum Energy Routing for
iterations, and without any dependency of the network Wireless Sensor Networks,” IEEE Transactions on

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 6 | Sep - Oct 2017 Page: 1137
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Vehicular Technology, vol. 58, 2, pp. 990-997, 19) L. A. Zane, “Fuzzy Sets,” Information and
(2009). Control, vol. 8, 3, pp. 338-353, (1965).
9) S. Sorrow, W. Heinemann, “Cluster head election 20) L. A. Sade, “Outline of a New Approach to the
techniques for coverage preservation in wireless Analysis of Complex Systems and Decision
sensor networks”, Ad Hoc Networks, vol. 7, no. 5, Processes,” IEEE Transactions on Systems, Man
pp. 955-972, (2009). and Cybernetics, SMC-3, 1, pp. 28-44, (1973).
10) T. Kauri, J. Beak,” A Strategic Deployment and 21) J. Greened, J. Rabies, “Lightweight Time
Cluster-Header Selection for Wireless Sensor Synchronization for Sensor Networks,”
Networks,” IEEE Transactions on Consumer International Workshop on Wireless Sensor
Electronics, Vol. 55, 4, pp. 1890-1897, (2009). Networks and Applications, (2003).
11) I. Gupta, D. Riordan, and S. Sample, “Cluster- 22) S. Singh, Miwok, and C. Raghavendra, “Power-
head election using fuzzy logic for Wireless aware routing in mobile ad hoc networks,” in
Sensor Networks,” In Communication Networks Proceeding of 4th Annual ACM/IEEE
and Services Research Conference, Proceedings of International Conference on Mobile Computing
the 3rd Annual, pp. 255–260, 2005. Networking (Modicum), (1998).
12) G. Ran, H. Zhang, S. Gong, “Improving on 23) E.H. Madman, and S. Assailant, An experiment in
LEACH protocol of Wireless Sensor Networks linguistic synthesis with a fuzzy logic controller.
Using Fuzzy Logic,” Journal of Information & International Journal of Man-Machine Studies,
Computational Science, pp. 767-775, 2010. vol. 7, 1, pp. 1-13, (1975).
13) N. Bazaars Torghabeh, M. R. Akbarzadeh Toto 24) R.Shah, J. Rafael, “Energy aware routing for low
chi, and M. H. Yaghmaee Moghaddam, “Cluster energy ad hoc Sensor Networks,” IEEE Wireless
Head Selection using a Two-Level Fuzzy Logic in Communications and Networking Conference, pp.
Wireless Sensor Networks,” International 350-355, vol.1, (2002).
Conference on Computer Engineering and
Technology, pp. 357-361, 2010.
14) M. C. M. Thin, T. Their, “An Energy Efficient
Cluster-Head Selection for Wireless Sensor
Networks,” International
15) S. Bandyopadhyay and E. J. Coyle, “An energy
efficient hierarchical clustering algorithm for
wireless sensor networks,” in Proceeding of IEEE
INFOCOM, vol. 3, pp. 1713-1723, (2003).
16) J. M. Kim, S.H. Park, Y.J. Han, and T.M. Chung,
“CHEF: cluster head election mechanism using
fuzzy logic in Wireless Sensor Networks,”
International Conference of Advanced
Communication Technology, pp. 654–659, 2008.
17) O. Youngish, M. Runs, and S. Ramasubramanian,
“Node Clustering in Wireless Sensor Networks:
Recent Developments and Deployment
Challenges,” IEEE Network, vol. 20, 3, pp. 20-25,
(2006).
18) W. B. Heinemann, A. P. Chandrakasan, and H.
Balakrishnan, “Energy-Efficient Communication
Protocol for Wireless Micro sensor Networks,”
Proceeding of the Hawaii International
Conference on System Sciences, pp. 1-10, (2000).

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 6 | Sep - Oct 2017 Page: 1138

You might also like